With the right kind of exploit, there's hardly any function, app, or bit of data an attacker couldn't access on your Mac, iPad, or iPhone.
Read moreEvaluating the Cyber War Set Off by Russian Invasion of Ukraine
February 25 2023Preparation and cooperation helped to mitigate the worst of the digital damage, amid cyber sorties from all sides.
Read moreTikTok Ban Hits EU Commission Phones as Cybersecurity Worries Mount
February 25 2023Employees of the EU Commission are no longer allowed to use the TikTok app thanks to concerns over data security.
Read moreTo Safeguard Critical Infrastructure, Go Back to Basics
February 24 2023CISA's recently released cybersecurity performance goals can help lower risk and thwart the impact of cyberattacks.
Read more87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
February 24 2023At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.
Read moreStudent Medical Records Exposed After LAUSD Breach
February 24 2023"Hundreds" of special education students' psych records have turned up on the Dark Web. School records like these are covered by FERPA, not HIPAA, so parents have little recourse.
Read morePirated Final Cut Pro for macOS Offers Stealth Malware Delivery
February 24 2023The number of people who have made the weaponized software available for sharing via torrent suggests that many unsuspecting victims may have downloaded the XMRig coin miner.
Read more
Recent Comments